Filters








32,599 Hits in 2.0 sec

Anonymity and Covert Channels in Simple Timed Mix-Firewalls [chapter]

Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz
2005 Lecture Notes in Computer Science  
Initial work considered a simple model [4] , with an observer (Eve) restricted to counting the number of messages leaving a Mix configured as a firewall guarding an enclave with one malicious sender (Alice  ...  The private enclave is behind a firewall which also functions as a timed Mix [6] that fires every tick, t, hence we call it a simple timed Mix-firewall.  ...  For the sake of simplicity we will refer to a simple timed Mix-firewall as a Mix-firewall in this paper. One of the N + 1 senders, called Alice, is malicious.  ... 
doi:10.1007/11423409_1 fatcat:zko7coa7hrcsxobjrcdu7zwpoi

Beware: NAT Traversal is a Simple and Efficient Approach to Open Firewall Holes

Elias P. Duarte Jr., Kleber V. Cardoso, Micael O.M.C. de Mello, João G.G. Borges
2020 Abakós  
However, as a side effect those techniques also freely proceed through firewalls.  ...  In this work we describe how it is possible to configure any server running on any port (no firewall configuration required) to establish connections initiated at arbitrary Internet clients, making unauthorized  ...  We describe a simple NAT traversal approach to allow application processes using any transport protocol to communicate seamlessly accross NAT devices and firewalls using IP-over-UDP tunnels.  ... 
doi:10.5752/p.2316-9451.2020v8n2p29-41 fatcat:mnu55cv6cvambhwocsxbrg76ly

Increasing Security of Nodes of a Blockchain by Simple Web Application Firewalls

Marc Jansen
unpublished
Those functionalities could be made available in a more secure way by providing a simple Web Application Firewall, allowing for filtering the access to certain endpoints by different aspects.  ...  Additionally, using a simple WAF does also not allow filtering the access to certain Web Service endpoints in relation to the source address of a given request.  ... 
fatcat:qzn3fzpiu5f37iw7rkkd4cn4fu

Firewall modules and modular firewalls

H. B. Acharya, Aditya Joshi, M. G. Gouda
2010 The 18th IEEE International Conference on Network Protocols  
We present a method for designing modular firewalls whose inversion metrics are very small. Each modular firewall consists of several components, called firewall modules.  ...  So by aiming to design firewalls with small inversion metrics, the designer may end up with firewalls whose dependency metrics are small as well.  ...  Below we describe how to identify "irrelevant rules" in any simple firewall F and argue that removing these rules from F yields a firewall G that is both equivalent to F and simple.  ... 
doi:10.1109/icnp.2010.5762766 dblp:conf/icnp/AcharyaJG10 fatcat:eqfehlup7ngn5ksnjx3cy2pmdq

Structured firewall design

Mohamed G. Gouda, Alex X. Liu
2007 Computer Networks  
First, one designs a firewall using a Firewall Decision Diagram instead of a sequence of often conflicting rules.  ...  This method addresses the consistency problem because a firewall decision diagram is conflict-free.  ...  simple firewall.  ... 
doi:10.1016/j.comnet.2006.06.015 fatcat:mzxabr6bljafdles3d5lzxpaqe

Structured Firewall Design [chapter]

2010 Firewall Design and Analysis  
First, one designs a firewall using a Firewall Decision Diagram instead of a sequence of often conflicting rules.  ...  This method addresses the consistency problem because a firewall decision diagram is conflict-free.  ...  simple firewall.  ... 
doi:10.1142/9789814261661_0002 fatcat:qzfg6yiqrrcencu3ro7jj3t6lq

Firewall design: consistency, completeness, and compactness

M.G. Gouda, X.-Y.A. Liu
2004 24th International Conference on Distributed Computing Systems, 2004. Proceedings.  
A firewall is usually designed as a sequence of rules.  ...  A firewall is often placed at the entrance of each private network in the Internet.  ...  r in Figure 6 , we obtain the simple firewall r in Figure 7 .  ... 
doi:10.1109/icdcs.2004.1281597 dblp:conf/icdcs/GoudaL04 fatcat:25zh6fsrsncnhprw7nxyaqtvg4

Verified iptables Firewall Analysis and Verification

Cornelius Diekmann, Lars Hupel, Julius Michaelis, Maximilian Haslbeck, Georg Carle
2018 Journal of automated reasoning  
We provide and verify procedures that translate from the complex iptables language into this simple model.  ...  We build our work around a formal semantics of the behavior of iptables firewalls.  ...  We thank the network administrators for contributing and agreeing to publish their firewall configurations. Lars Noschinski contributed proofs to the formalization of the IP address space.  ... 
doi:10.1007/s10817-017-9445-1 pmid:30069072 pmcid:PMC6044321 fatcat:jgqymzilcbdfpk5xwov7igpilq

Enterprise firewall virtualization design

Ari Sujarwo, Jefferson Tan, S. Ma'mun, H. Tamura, M.R.A. Purnomo
2018 MATEC Web of Conferences  
At the end of the paper, the results shows that this method is works and was tested using a real enterprise firewall.  ...  This paper aims to propose a method to control enterprise firewall which is basically a static engine to be a dynamic engine to cope with the Grid needs.  ...  A simple one layer security is no longer suitable to Grid infrastructure needs. The firewall performs traffic checks during its operation.  ... 
doi:10.1051/matecconf/201815403004 fatcat:ow4gqdw2jzcuxivulzxw5nbxpa

Firewall Queries [chapter]

Alex X. Liu, Mohamed G. Gouda, Huibo H. Ma, Anne HH. Ngu
2005 Lecture Notes in Computer Science  
In this paper, we first introduce a simple and effective SQL-like query language, called the Structured Firewall Query Language (SFQL), for describing firewall queries.  ...  Two problems need to be solved in order to make firewall queries practically useful: how to describe a firewall query and how to process a firewall query.  ...  First, we introduce a simple and effective SQL-like query language, the Structured Firewall Query Language, for describing firewall queries.  ... 
doi:10.1007/11516798_15 fatcat:g7tde2tuhnbzjmbdi2hrtnpf4y

Diverse Firewall Design

Alex X. Liu, Mohamed G. Gouda
2008 IEEE Transactions on Parallel and Distributed Systems  
The technical challenge in the method of diverse firewall design is how to discover all the discrepancies between two given firewalls.  ...  between two semi-isomorphic firewall decision diagrams.  ...  Consider the simple network in Figure 1 .  ... 
doi:10.1109/tpds.2007.70802 fatcat:uopc353j7redhp574kkafneatm

I6-FPS: Automating the ICMPv6 Filtering Rules

Wan Nor Ashiqin Wan Ali, Abidah Mat Taib, Syed Zulkarnain Syed Idrus, S.A. Aljunid, M.A.A. Mohd Salleh, C.B.M. Rashidi, P.J. Soh, K.N.F. Ku Azir
2018 MATEC Web of Conferences  
The Firestarter provides a functional, secured and simple GUI softwarebased designed for an advanced firewalling technology [7] .  ...  They also stated that packet filtering firewall is enforced broadly because it is simple, forwards quicker, more efficient and clear to the users.  ... 
doi:10.1051/matecconf/201815006001 fatcat:2ziyuiekmvbnrnpmmn63sffqc4

Security by Checklist

Steve Bellovin
2008 IEEE Security and Privacy  
T hat's the real danger with checklists: they try to substitute simple adherence to rules for thought.  ...  We're told "always use a firewall" but why?  ... 
doi:10.1109/msp.2008.43 fatcat:t556k2i76zfudmfddqnnmbogfe

Identifying the Missing Aspects of the ANSI/ISA Best Practices for Security Policy

Dinesha Ranathunga, Matthew Roughan, Phil Kernick, Nick Falkner, Hung Nguyen
2015 Proceedings of the 1st ACM Workshop on Cyber-Physical System Security - CPSS '15  
We then apply our corrected best practice specifications to real SCADA firewall configurations and evaluate their usefulness for high-level automated specification of firewalls.  ...  However, firewalls continue to be configured manually, a common but error prone process.  ...  Additionally, through real-world case studies we illustrate that SCADA firewalls, even in simple cases are not configured appropriately.  ... 
doi:10.1145/2732198.2732201 dblp:conf/ccs/RanathungaRKFN15 fatcat:zjsjz4s7ybao3aplc7nlebcmkq

Firewall Policy Queries

A.X. Liu, M.G. Gouda
2009 IEEE Transactions on Parallel and Distributed Systems  
In this paper, we first introduce a simple and effective SQL-like query language, called the Structured Firewall Query Language (SFQL), for describing firewall queries.  ...  Two problems need to be solved in order to make firewall queries practically useful: how to describe a firewall query and how to process a firewall query.  ...  Fig. 1 shows an example of a simple firewall.  ... 
doi:10.1109/tpds.2008.263 fatcat:xpxsxjqm4jakdgr4dyj4bnzabe
« Previous Showing results 1 — 15 out of 32,599 results